An Adaptive Initial Trust and Demand Aware Secure Resource Discovery (AID-SRD) model for pervasive environments

Traditional computer systems and small distributed networks rely on users' authentication to provide security. However, this strategy is extremely inadequate for the increased flexibility of pervasive environments, where users join and leave frequently. Here, users want to discover services dynamically and share them safely taking into account some constraints such as limited computational power and decentralized management. In this paper, we propose a solution to this using a secure resource discovery model. Most of the prior research works on resource discovery assume a constant initial trust value because assignment of initial trust is a critical issue. Even in pervasive smart space, some service sharing may need high security. The level of service security therefore needs to be incorporated in initial trust assignment. In this paper, we present an Adaptive Initial trust and Demand aware Secure Resource Discovery (AID-SRD) model for pervasive environment. We incorporate a Demand Unit in AID-SRD which enables efficient resource sharing with unknown devices. AIDSRD also assigns initial trust considering the variable security need of different services.

[1]  Mohammad Zulkernine,et al.  Towards Secure Trust Bootstrapping in Pervasive Computing Environment , 2008, 2008 11th IEEE High Assurance Systems Engineering Symposium.

[2]  Daniele Quercia,et al.  TRULLO - local trust bootstrapping for ubiquitous devices , 2007, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous).

[3]  Sheikh Iqbal Ahamed,et al.  A Risk-aware Trust Based Secure Resource Discovery (RTSRD) Model for Pervasive Computing , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).

[4]  Sheikh Iqbal Ahamed,et al.  MARKS (Middleware Adaptability for Resource Discovery, Knowledge Usability and Self-healing) for Mobile Devices of Pervasive Computing Environments , 2006, Third International Conference on Information Technology: New Generations (ITNG'06).

[5]  Frank Stajano,et al.  Security for Ubiquitous Computing , 2002, ICISC.

[6]  Sheikh Iqbal Ahamed,et al.  SAFE-RD (secure, adaptive, fault tolerant, and efficient resource discovery) in pervasive computing environments , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[7]  Sheikh Iqbal Ahamed,et al.  An adaptive lightweight trust reliant secure resource discovery for pervasive computing environments , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).

[8]  David R. Karger,et al.  INS/Twine: A Scalable Peer-to-Peer Architecture for Intentional Resource Discovery , 2002, Pervasive.

[9]  Lionel M. Ni,et al.  Splendor: A secure, private, and location-aware service discovery protocol supporting mobile services , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[10]  Haifeng Li,et al.  SSRD+: A Privacy-aware Trust and Security Model for Resource Discovery in Pervasive Computing Environment , 2006, 30th Annual International Computer Software and Applications Conference (COMPSAC'06).

[11]  Mark Weiser,et al.  Some computer science issues in ubiquitous computing , 1993, CACM.

[12]  Mohammad Zulkernine,et al.  Architecture and Implementation of a trust Model for Pervasive Applications , 2008, J. Mobile Multimedia.

[13]  Mark Weiser,et al.  Some Computer Science Problems in Ubiquitous Computing , 1993 .

[14]  T. Nixon,et al.  Home networking with Universal Plug and Play , 2001 .

[15]  Frank Stajano,et al.  The Resurrecting Duckling: security issues for ubiquitous computing , 2002, S&P 2002.

[16]  Mahadev Satyanarayanan,et al.  Fundamental challenges in mobile computing , 1996, PODC '96.

[17]  Celeste Campo,et al.  SPDP: A Secure Service Discovery Protocol for Ad-hoc Networks , 2003 .

[18]  Lionel M. Ni,et al.  PrudentExposure: a private and user-centric service discovery protocol , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.

[19]  Michael Nidd,et al.  Service discovery in DEAPspace , 2001, IEEE Wirel. Commun..

[20]  Hari Balakrishnan,et al.  The design and implementation of an intentional naming system , 1999, SOSP.

[21]  Armando Fox,et al.  System Software for Ubiquitous Computing , 2022 .

[22]  Lionel M. Ni,et al.  Expose or not? A progressive exposure approach for service discovery in pervasive computing environments , 2005, Third IEEE International Conference on Pervasive Computing and Communications.